Behavioral task
behavioral1
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win10v2004-20220812-en
General
-
Target
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334
-
Size
160KB
-
MD5
806880efba74530858b2b00c59211768
-
SHA1
4f943d4db9d98c4e2392b4d36d877292affbdd91
-
SHA256
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334
-
SHA512
dc71eb7a67f81d29c36ddfe1bb0de6ed95425a5d2d3e2ff582bbff7d3e5ba3000a0fd38d470e361eee68c3defcf8265589357e5c3c12b1ee21680a799cdff070
-
SSDEEP
3072:Hgrr1iDIGMl/K3HzB6Hh8gg6+24v4EqJwepqxpH9K7lxyyNzNfgZ:HqKIHKDB27g6+JI5pKUQr
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe windows x86
de39dc68941cc6307e3b2590c857a907
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
user32
wsprintfA
advapi32
RegCloseKey
ole32
OleRun
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 83KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 68KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE